Abstract
An analysis of existing network security solutions shows that a promising direction is to improve traffic management and routing process that should consider network performance parameters and network security parameters that characterize the efficiency of network intrusion detection systems and analyze vulnerabilities and risks. A flow-based model of secure routing with load balancing has been developed with modified load balancing conditions and considering the probability of its compromise. It has been found that in the process of load balancing, links with a lower compromise probability are loaded more intensively, unloading more vulnerable from the point of view of links compromise.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gupta S (2018) Security and QoS in wireless sensor networks, 1st edn. eBooks2go Inc.
Kiser Q (2020) Computer networking and cybersecurity: a guide to understanding communications systems, internet connections, and network security along with protection from hacking and cyber security threats. Kindle Edition
Barreiros M, Lundqvist P (2015) QoS-enabled networks: tools and foundations. Wiley, New York
Dodd, A.Z.: The Essential Guide to Telecommunications (Essential Guide Series). Pearson. (2019)
Sheluhin O, Smolskiy S, Osin A (2007) Self-similar processes in telecommunications. Wiley, New York
Park K, Willinger W (eds) Self‐similar network traffic and performance evaluation. Wiley, New York
Lemeshko OV, Yevseyeva OY, Garkusha SV (2013) A tensor model of multipath routing based on multiple QoS metrics. In: 2013 International Siberian conference on control and communications (SIBCON) proceedings. IEEE, pp 1–4. https://doi.org/10.1109/SIBCON.2013.6693645
Yeremenko O, Lemeshko O, Persikov A (2018) Secure routing in reliable networks: proactive and reactive approach. In: Shakhovska N, Stepashko V (eds) CSIT 2017. AISC, vol 689. Springer, Cham, pp 631–655. https://doi.org/10.1007/978-3-319-70581-1_44
Lemeshko O, Yeremenko O, Yevdokymenko M, Shapovalova A, Hailan AM, Mersni A (2019) Cyber resilience approach based on traffic engineering fast reroute with policing. In: 2019 10th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS) Proceedings, vol 1. IEEE, pp 117–122 (2019). https://doi.org/10.1109/IDAACS.2019.8924294
Medhi D, Ramasamy K (2017) Network routing: algorithms, protocols, and architectures. Morgan Kaufmann
Rak J, Hutchison D (eds) Guide to disaster-resilient communication networks (computer communications and networks), 1st edn. 2020 Edition. Springer, Berlin
Lemeshko O, Papan J, Yeremenko O, Yevdokymenko M, Segec P (2021) Research and development of delay-sensitive routing tensor model in IoT core networks. Sensors 21(11):1–23. https://doi.org/10.3390/s21113934
Lemeshko OV, Yeremenko OS, Hailan AM (2016) QoS solution of traffic management based on the dynamic tensor model in the coordinate system of interpolar paths and internal node pairs. In: 2016 International conference radio electronics & info communications (UkrMiCo) proceedings. IEEE, pp 1–6. https://doi.org/10.1109/UkrMiCo.2016.7739625
Lemeshko O, Yeremenko O (2016) Routing tensor model presented in the basis of interpolar paths and internal node pairs. In: 2016 third international scientific-practical conference problems of infocommunications science and technology (PIC S&T) Proceedings. IEEE, pp 201–204. https://doi.org/10.1109/INFOCOMMST.2016.7905381
Lemeshko O, Yeremenko O, Yevdokymenko M, Radivilova T (2021) Research of the QoE fast ReRouting processes with differentiated R-factor maximization for VoIP-flows using the tensor model of the corporate telecommunication network. In: Vorobiyenko P, Ilchenko M, Strelkovska I (eds) Current trends in communication and information technologies. IPF 2020. Lecture notes in networks and systems, vol 212. Springer, Cham. https://doi.org/10.1007/978-3-030-76343-5_6
Lemeshko O, Yeremenko O, Yevdokymenko M, Hailan AM (2021) Tensor multiflow routing model to ensure the guaranteed quality of service based on load balancing in network. In: Hu Z, Petoukhov S, Dychka I, He M (eds) Advances in computer science for engineering and education III. ICCSEEA 2020. Advances in intelligent systems and computing, vol 1247. Springer, Cham. https://doi.org/10.1007/978-3-030-55506-1_11
Lee Y, Seok Y, Choi Y, Kim C (2002) A constrained multipath traffic engineering scheme for MPLS networks. In: 2002 IEEE international conference on communications. ICC 2002 (Cat. No.02CH37333) Proceedings, vol 4. IEEE, pp 2431–2436. https://doi.org/10.1109/ICC.2002.997280
Norros I (1994) A storage model with self-similar input. Queueing Syst 16:387–396. https://doi.org/10.1007/BF01158964
Shah SA, Issac B (2018) Performance comparison of intrusion detection systems and application of machine learning to snort system. Futur Gener Comput Syst 80:157–170. https://doi.org/10.1016/j.future.2017.10.016
Kron G (1965) Tensor analysis of networks. Wiley, New York
Akimaru H, Kawashima K (2012) Teletraffic: theory and applications. Springer Science & Business Media, Berlin
Yevdokymenko M, Yeremenko O, Shapovalova A, Shapoval M, Porokhniak V, Rogovaya N (2021) Investigation of the secure paths set calculation approach based on vulnerability assessment. In: Modern machine learning technologies and data science workshop. Proceedings of 3rd international workshop (MoMLeT&DS 2021), 2917, pp 207–217
Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS). NIST special publication 800-94
Common Vulnerability Scoring System v3.0: Examples, Forum of Incident Response and Security Teams. https://www.first.org/cvss/examples
Abedin M, Nessa S, Al-Shaer E, Khan L (2006) Vulnerability analysis for evaluating quality of protection of security policies. QoP ’06. https://doi.org/10.1145/1179494.1179505
Peltier TR (2005) Information security risk analysis. CRC Press, Boca Raton
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lemeshko, O., Yeremenko, O., Yevdokymenko, M. (2022). Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks. In: Oliynykov, R., Kuznetsov, O., Lemeshko, O., Radivilova, T. (eds) Information Security Technologies in the Decentralized Distributed Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 115. Springer, Cham. https://doi.org/10.1007/978-3-030-95161-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-95161-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95160-3
Online ISBN: 978-3-030-95161-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)